Permission Model
Understand the roles and permissions that control who can administer workspaces, review decisions, and manage governance.
DecisionOps uses four baseline roles: reader, contributor, approver, and admin. Those roles determine what a person can see, create, approve, or manage across the workspace.
Readers can browse decisions, monitoring, and other read-only views. Contributors can also draft and edit decisions. Approvers can do everything contributors can do and can additionally approve or supersede decisions. Admins manage organization settings, including members, API keys, integrations, rules, constraints, and repository policy.
Practical Boundaries
If a user can open a page but cannot change anything on it, that usually means their role includes read access but not the corresponding write scope. This is common on organization settings screens, rules, API keys, and integrations. Decision actions follow a similar pattern: contributors can write drafts, but approve and supersede actions require approver or admin access.
Where This Matters Most
Role boundaries are most visible on these pages:
/decisions/newand/decisions/:decisionId/editfor draft and edit access/organization/membersfor invitations and role changes/organization/api-keysfor create and revoke actions/integrations/githuband/integrations/agentsfor setup and connection management/rulesand/pr-gatekeeper/overridesfor governance controls
If a control is disabled or missing, check the user’s workspace role first before assuming the page is broken.